🥷
Red
  • 🟥Overview
  • 📚Education
    • 🧐Guides
    • 🏋️Training
    • 📕Books
    • 🥳Conventions
    • 📰News
    • 🗝️Physical Tools
    • 🗣️Podcasts
    • 📹YT Channels
  • Setup
    • ctf setup
    • Exploitation Frameworks
    • Learning Offense
    • rando
  • ⭕Attacker Lifecycle
    • Steps
      • Engagement
      • 🔬Recon
        • OSINT
        • Active Recon / footprinting
      • 👀Initial Access
        • Exploit
          • SMB
        • Internal Recon
        • Linux Custom Enum Script
        • enumerate Script
        • Windows Privilege Escalation
      • 🧞Privilege Escalation
        • Ways To Privelege Escalate
      • Data Exfil
        • Data Exfil 1
      • Reporting
  • Bug Bounty
    • Bug Bounty Sites
    • OWASP Top 10
      • Injection
      • Broken Authentication
      • Sensitive Data Exposure
      • XML External Entities (XXE)
      • Broken Access Control
      • Security Misconfigurations
      • Cross-Site Scripting (XSS)
      • Insecure Deserialization
      • Using Components with Known Vulnerabilities
      • Insufficient Logging and Monitoring
Powered by GitBook
On this page
  1. Bug Bounty
  2. OWASP Top 10

Sensitive Data Exposure

This risk involves the inadequate protection of sensitive data, such as passwords, financial information, or personal identifiable information (PII). If this data is not properly encrypted or protected, it can be accessed by attackers.

# Vulnerable code (transmitting sensitive data over unencrypted channel)
loginData = {
    "username": request.getParameter("username"),
    "password": request.getParameter("password")
}
httpClient.post("http://example.com/login", data=loginData)

# Secure code (transmitting sensitive data over encrypted channel, e.g., HTTPS)
loginData = {
    "username": request.getParameter("username"),
    "password": request.getParameter("password")
}
httpClient.post("https://example.com/login", data=loginData)
PreviousBroken AuthenticationNextXML External Entities (XXE)

Last updated 2 years ago